A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
In wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/2484268 |
id |
doaj-e430ff7411e64807bfdcd9af711082ab |
---|---|
record_format |
Article |
spelling |
doaj-e430ff7411e64807bfdcd9af711082ab2020-11-24T23:34:34ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/24842682484268A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor NetworksKe Zhang0Kai Xu1Fushan Wei2Network Information Center, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, ChinaIn wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the user. The security of the proposed protocol is conducted in a well-defined security model under the CDH assumption. Compared with other related protocols, our protocol is efficient in terms of communication and enjoys stronger security. The only disadvantage is that our protocol consumes more computation resources due to the usage of asymmetric cryptography mechanisms to realize strong anonymity. Consequently, our protocol is suitable for applications which require strong anonymity and high security in wireless sensor networks.http://dx.doi.org/10.1155/2018/2484268 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ke Zhang Kai Xu Fushan Wei |
spellingShingle |
Ke Zhang Kai Xu Fushan Wei A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks Wireless Communications and Mobile Computing |
author_facet |
Ke Zhang Kai Xu Fushan Wei |
author_sort |
Ke Zhang |
title |
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks |
title_short |
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks |
title_full |
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks |
title_fullStr |
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks |
title_full_unstemmed |
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks |
title_sort |
provably secure anonymous authenticated key exchange protocol based on ecc for wireless sensor networks |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
In wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the user. The security of the proposed protocol is conducted in a well-defined security model under the CDH assumption. Compared with other related protocols, our protocol is efficient in terms of communication and enjoys stronger security. The only disadvantage is that our protocol consumes more computation resources due to the usage of asymmetric cryptography mechanisms to realize strong anonymity. Consequently, our protocol is suitable for applications which require strong anonymity and high security in wireless sensor networks. |
url |
http://dx.doi.org/10.1155/2018/2484268 |
work_keys_str_mv |
AT kezhang aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks AT kaixu aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks AT fushanwei aprovablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks AT kezhang provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks AT kaixu provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks AT fushanwei provablysecureanonymousauthenticatedkeyexchangeprotocolbasedoneccforwirelesssensornetworks |
_version_ |
1725528823121838080 |